UPHClean and other profile ramblingsA blog to discuss UPHClean and profile problemshttp://blogs.technet.com/b/uphclean/atom.aspxTelligent Community 7.1.12.36162 (Build: 7.1.12.36162)2008-02-28T10:27:00ZUPHClean v1.6 Security Vulnerability Fixhttp://blogs.technet.com/b/uphclean/archive/2010/09/13/uphclean-v1-6-security-vulnerability-fix.aspx2010-09-13T13:56:00Z2010-09-13T13:56:00Z<p>The previous version of UPHClean did not call the system executable using quotes. This could in some scenarios allow a local user to elevate privileges. This issue has now been addressed in the current version. Thanks to Thierry Zoller from Verizon Business for reporting this issue to us.</p>
<p>&nbsp;</p>
<p>Updated bits (v1.6g)&nbsp; are being posted on the <a href="http://www.microsoft.com/downloads/en/details.aspx?FamilyID=1b286e6d-8912-4e18-b570-42470e2f3582">Microsoft Download Center</a>&nbsp;and should be available shortly.</p><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=3355039&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxStatus of UPHCleanhttp://blogs.technet.com/b/uphclean/archive/2010/01/06/status-of-uphclean.aspx2010-01-06T19:59:00Z2010-01-06T19:59:00Z<P>Hi!</P>
<P>First let me apologize for the length of time since my last post.&nbsp; Unfortunately this post is to report that UPHClean is now officially dormant.&nbsp;&nbsp;Release bits for UPHClean v2.0 are not forthcoming.&nbsp;&nbsp;There's no plan of record for release. This means that even if it was restarted it would be months or much longer to get a final package ready.&nbsp;At various point I had hope that I could get time together to produce a final package but it is not in the cards for the forseable future.&nbsp; This is not happening.</P>
<P>This means that the current beta build (2.0.49.0) is the latest bits and will stay the only code available for the forseable future.&nbsp; This code works well for most people (&gt; 99%).&nbsp; It does not function on Windows Vista, Windows Server 2008, Windows 7 nor Windows Server 2008 R2.&nbsp; As I have mentioned in other posts there's definintely some possibility of machine running beta bits of UPHClean v2.0 to crash or hang.&nbsp; The best course of action in those cases is to discontinue usage of UPHClean.</P>
<P>Thank you for you great support on making UPHClean a success.</P>
<P>Robin Caron</P>
<P mce_keep="true">&nbsp;</P><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=3304103&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxNew UPHClean beta buildhttp://blogs.technet.com/b/uphclean/archive/2008/10/31/new-uphclean-beta-build.aspx2008-11-01T00:27:26Z2008-11-01T00:27:26Z<p>Hi there!</p> <p>&#160;</p> <p>Good news -- I'm releasing an updated beta build today.&#160; It fixes machine hangs and crashes that could occur with build 2.0.48.0.&#160; </p> <p>The 32 bit plaform bits are <a href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-beta-build-2-0-49-0-for-32-bit-platform-operating-system.aspx">here</a> and for 64 bit platforms <a href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-build-2-0-49-0-beta-for-64-bit-platform-operating-system.aspx">here</a>.</p> <p>If you find any problem with this build please email the details to <a href="mailto:uphclean@microsoft.com">uphclean@microsoft.com</a> or post them here.</p> <p>Thank you all for your patience in waiting for updated beta bits.</p> <p>Robin</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=3145469&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxCall stack logging: what it is and where does it go?http://blogs.technet.com/b/uphclean/archive/2008/07/17/call-stack-logging-what-it-is-and-where-does-it-go.aspx2008-07-17T20:26:00Z2008-07-17T20:26:00Z<P>To understand what call stack logging is you must understand how software works internally.&nbsp; Software is put together using small pieces of code.&nbsp; These pieces are called functions.&nbsp; Complex work is done by breaking it down into simpler tasks.&nbsp; A function that performs a complex behavior gets it done by doing some of the work itself and by using functions to do simpler tasks.</P>
<P mce_keep="true">&nbsp;</P>
<P>When a function uses another function to perform a simpler task it needs to make sure that once the simpler function is done work resumes on the more complex task. To make this happen it saves off where it was.&nbsp; It is saved to an area of memory called the stack.&nbsp; The simpler function may very well also call on other function to perform even simpler tasks.&nbsp; It also needs to save off where work was before it calls on simpler function.</P>
<P mce_keep="true">&nbsp;</P>
<P>This is why the area of memory where this information is saved is called a stack.&nbsp; Just like you would pile dishes on top of each other, the saved information is piled on top of each other.&nbsp; When the simpler function is done to find out where work should resume it picks off the top of the pile.&nbsp; This tells it where to go back to.&nbsp; This repeats when that function is done.</P>
<P mce_keep="true">&nbsp;</P>
<P>Now suppose whenever an action is taken (e.g. retrieving a handle to a registry key) this stack memory is recorded.&nbsp; To do this the simpler task function looks at the stack memory find out where work would resume when it is done.&nbsp; What is being recorded is the address in memory where the instruction is that resumes the more complex work.&nbsp; This is literally just a number between 0 and about 4 billon.&nbsp; Using the earlier example this address could in a function in a printer driver that needs the page size to print on.&nbsp; This process can keep going and look at when the the page size retrieval function that is done where work would resume.&nbsp; This might be function that is responsible for printing.&nbsp; It can keep doing that back all the way to the function that starts the application (some function in a printer spooler).&nbsp; This information (a list of memory addresses) is called a call stack log or call stack for short.</P>
<P mce_keep="true">&nbsp;</P>
<P>Now imagine you decided that retrieving a registry key handle is causing a problem you could inspect the recorded information to determine why the action was taken.&nbsp; This helps in narrowing down what causes the problem.&nbsp; This is especially true today because applications are put together using 100s of thousands of functions from many vendors.&nbsp; Knowing the call stack tells you who initiated the action that causes a problem.</P>
<P mce_keep="true">&nbsp;</P>
<P>Collection of call stacks is an option in UPHClean v1.6d enabled via the registry setting HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\UPHClean\Parameters\CALLSTACK_LOG to 1.&nbsp; The value is a DWORD but you should find it there if UPHClean has ever been run.</P>
<P mce_keep="true">&nbsp;</P>
<P>The actual call stack logging is something that is not actually done by UPHClean.&nbsp; You can understand why based on the explanation I gave above: UPHClean is not being called on to perform the action of opening a registry handle.&nbsp; This work is actually by functions that reside in the DLL ADVAPI32.&nbsp; So when you set this option what UPHClean does is set a registry setting (HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\LeakTrack).&nbsp; The functions in ADVAPI32 responsible for getting a registry key handle read this value.&nbsp; When the value is set appropriately they collect a call stack whenever they are asked to get a registry key under the user profile hives.&nbsp; Later when the registry keys are release closed it removes the discards the collected call stack information.</P>
<P mce_keep="true">&nbsp;</P>
<P>When UPHClean is about to process a handle that is leaked by an application for remapping or closure UPHClean checks to see if call stack logging is enabled.&nbsp; If call stack logging is enabled it reads the stack information recorded by ADVAPI32.&nbsp; This information is recorded as a list of memory addresses tha</P>
<P mce_keep="true">&nbsp;</P>
<P>It is logged in the application event log as an addition to event 1401 or 1201.&nbsp; The readme has an example:</P>
<P>Event Type:&nbsp;Information<BR>Event Source:&nbsp;UPHClean<BR>Event Category:&nbsp;None<BR>Event ID:&nbsp;1201<BR>Date:&nbsp;&nbsp;10/21/2003<BR>Time:&nbsp;&nbsp;5:17:38 PM<BR>User:&nbsp;&nbsp;RCARONDOM-DC1\u1<BR>Computer:&nbsp;RCARONDOM-DC1<BR>Description:<BR>The following handles in user profile hive RCARONDOM-DC1\u1<BR>(S-1-5-21-3230802392-3390281410-1560515013-1307) have been closed because they<BR>were preventing the profile from unloading successfully:<BR>&nbsp;<BR>profleak.exe (2604)<BR>&nbsp; HKCU (0x80)<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x77dfc200 ADVAPI32!TrackObject+0xe<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x00412112 profleak!&lt;no symbol&gt;<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x77db571b ADVAPI32!ScSvcctrlThreadA+0xe<BR>&nbsp; HKCU\Software\Policies (0x88)<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x77dfc200 ADVAPI32!TrackObject+0xe<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x77da1949 ADVAPI32!RegOpenKeyExW+0x10b<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x0041350c profleak!&lt;no symbol&gt;<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x00412112 profleak!&lt;no symbol&gt;<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0x77db571b ADVAPI32!ScSvcctrlThreadA+0xe</P>
<P mce_keep="true">&nbsp;</P>
<P>This this call stack data indicates that the user profile hive handle leak is caused by profleak.&nbsp; Profleak is an application used to causes a user profile hive handle leak.&nbsp;&nbsp; It is not true that in all cases the listed module/DLL listed after ADVAPI32 is the culprit.&nbsp; Interpreting this information requires an experienced developer or someone who can debug.</P>
<P mce_keep="true">&nbsp;</P><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=3090245&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxWhen will UPHClean v2.0 be done?http://blogs.technet.com/b/uphclean/archive/2008/03/06/when-will-uphclean-v2-0-be-done.aspx2008-03-07T00:58:00Z2008-03-07T00:58:00Z<P>UPHClean v2.0 has been in beta for an extended period.&nbsp; Over 3,000 people have received the beta bits.&nbsp; There have been enough reports of computers hanging and crashing to prevent release.&nbsp; Further beta builds are needed to insure that those remaining problems are resolved.&nbsp; Once ship quality is achieved a release date will be selected.&nbsp; Based on my current work load and experience with past projects I expect that will at least 6 more months before final release.</P><img src="http://blogs.technet.com/aggbug.aspx?PostID=2969604&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxGroup Policy Administrative Template To Manage 2.0 Beta Settingshttp://blogs.technet.com/b/uphclean/archive/2008/03/04/group-policy-administrative-template-to-manage-2-0-beta-settings.aspx2008-03-05T00:18:00Z2008-03-05T00:18:00Z<P>Here is an administrative template to make it easier to manage the file remapping settings available with UPHClean v2.0.</P>
<P>Thank you Kevin Henriksen for this contribution.</P><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=2961022&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxAbout UPHClean v2.0 events 1630, 1631 and 1632http://blogs.technet.com/b/uphclean/archive/2008/03/03/about-uphclean-v2-0-events-1630-1631-and-1632.aspx2008-03-03T20:38:00Z2008-03-03T20:38:00Z<P>UPHClean v2.0 tries to assist when the security descriptor prevents access to a file or directory.&nbsp; This often prevents the system from completing the profile reconciliation process.&nbsp; This can happen because the inherited permissions are set incorrectly or possibly because the user sets to prevent administrative and/or system access.</P>
<P>UPHClean attempts to deal with that by changing the security descriptor.&nbsp; This is done for access to file or directory access that result in access denied.&nbsp; In the case where the file or directory is local it is likely that UPHClean will be able to change the security descriptor since it can use the take ownership right to do so.&nbsp; In the remote case it is possible that UPHClean will fail to change the permissions.&nbsp; So this correction UPHClean may not always succeed.</P>
<P>Here are relevant events that can occur:</P>
<UL>
<LI>Event 1630: Access to %1 was granted after updating the security descriptor of the file.
<UL>
<LI>This event indicates that UPHClean changed the security descriptor for the file/directory named %1 and was successful.&nbsp; Access permissions necessary to proceed with profile work were granted.&nbsp; Access to the file or directory was successful. </LI></UL></LI>
<LI>Event&nbsp; 1631: Access to %1 failed after updating the security descriptor of the file.
<UL>
<LI>This event indicates that UPHClean changed the security descriptor and was successful.&nbsp; Even though UPHClean granted the access permissions necessary to perform the profile work the requested access was denied.&nbsp; This can happen if the source of the access denied is not security descriptor permission related.&nbsp; The interference could be coming from a background process (i.e. a virus scanner) or other unknown source. </LI></UL></LI>
<LI>Event 1632: Security descriptor for file %1 could not be updated.&nbsp; Error %2 %3.
<UL>
<LI>This event indicates that UPHClean failed in its attempt to change the security descriptor.&nbsp; %2 is replaced with the text of the error and %3 is the error number.&nbsp; Access to the file or directory failed. </LI></UL></LI></UL>
<P>Note that the name logged with the event may contain an unfamiliar drive letter.&nbsp; This drive letter represents the roaming profile location.&nbsp; It exists only during the profile reconciliation process.</P>
<P>These events are logged so that you can know that UPHClean took these actions.&nbsp; This is critical if auditing.&nbsp; </P>
<P>If the user profile is reconciling properly you can ignore these.&nbsp; If the profile is not reconciling properly and you are logging events 1631 or 1632 you should review the security descriptor hierarchy to insure that the permissions are as intended and allow system/administrative access.</P><img src="http://blogs.technet.com/aggbug.aspx?PostID=2955602&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxUPHClean v2.0 betahttp://blogs.technet.com/b/uphclean/archive/2008/02/28/uphclean-v2-0-beta.aspx2008-02-28T22:39:00Z2008-02-28T22:39:00Z<PSO you are interested in trying out the UPHClean v2.0 beta?&nbsp;&nbsp; Very good that is what I am offering today!< P>
<P>So you want to try out the UPHClean v2.0 beta?&nbsp; Very good because that is what this post is about!</P>
<P>The current beta build installs on Windows 2000, Windows XP and Windows Server 2003. A future build will install on Windows Vista and Windows Server 2008.<BR><BR>To get the full benefit of UPHClean you should set the registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPHClean\Parameters\SHARING_VIOLATION_REMAP to 1. This setting allows UPHClean to act on problems caused by application holding on to files after logoff. When this happens you may see profile folders left behind and/or creation of profile folders with names username.domain, username.000, username.001, etc.&nbsp; Do this after installation is done.<BR><BR>Remember it is beta code.&nbsp; Others who have tested it have reported <STRONG><EM>crashes</EM></STRONG> or <EM><STRONG>hangs</STRONG></EM>. It has been rare but keep that in mind when you decide what testing to do with it. UPHClean v2.0 will be released once the current build does not cause crashing/hanging. I will announce later beta bits through this blog.</P><PYOU class="" the can find beta bits for 32 bit platforms <A href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-beta-for-32-bit-platform-operating-system.aspx" mce_href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-beta-for-32-bit-platform-operating-system.aspx">The 32 bit plaform bits are <A class="" title=here href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-beta-for-32-bit-platform-operating-system.aspx" mce_href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-beta-for-32-bit-platform-operating-system.aspx">here</A> and for 64 bit platforms <A class="" href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-beta-for-x64.aspx" mce_href="http://blogs.technet.com/uphclean/pages/uphclean-v2-0-beta-for-x64.aspx">here</A>.
<P>I appreciate any feedback you have on this release.<BR style="mso-special-character: line-break"></P><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=2940870&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxUPHClean v2.0http://blogs.technet.com/b/uphclean/archive/2008/02/28/uphclean-v2-0.aspx2008-02-28T21:18:00Z2008-02-28T21:18:00Z<P>UPHClean v2.0 is a new version that tries to help with the following scenarios:</P>
<P><STRONG>Timing fix</STRONG></P>
<P>In v1.6 there is a timing issue with where the profile unload process stopped trying to unload the user profile hive before UPHClean finished&nbsp;its work. UPHClean finished its release of user profile hive handles but Winlogon had already proceeded without unloading the profile causing it to report a profile hive unload failure.&nbsp; This is now addressed by having Winlogon waiting until UPHClean has finished all of its work before proceeding.</P>
<P><STRONG>Open file handles</STRONG></P>
<P>Apart open registry handles that UPHClean v1.6 deals with&nbsp;open file handles to the user profile can have a bad influence on the profile load and unload process. Open references to profile files prevent the profile load and unload process from reconciling (copying files) from and to the roaming profile location.&nbsp; This prevents the deletion of the locally cached profile.&nbsp; Other symptoms of this is if the same user logs in again he or she gets a new profile with a name like username.000, username.001 etc. </P>
<P>UPHClean v2.0 takes care of these by releasing the handle to user profile files when the profile is unloaded.&nbsp; This is not without risk.&nbsp; Since UPHClean removes access to files or directories data that was cached by the application for the file is lost.&nbsp; This could cause the process to fail because it cannot read from the file. During testing this has not been found to be true but there is still a chance that it could happen. This is the reason why the file handle remap feature is disabled by default.</P>
<P>To enable the feature you have to set the following registry key:</P>
<P>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPHClean\Parameters<BR><STRONG>SHARING_VIOLATION_REMAP</STRONG> REG_DWORD 0X00000001</P>
<P>Without enabling the remapping feature UPHClean automatically detects sharing violation during the user logoff and retries the failed operation for a small amount of time. You can control the amount of time using the <STRONG>SHARING_VIOLATION_DELAY</STRONG> value.&nbsp;This value is specified in millisecond and has a default value of 1000 millisecond.&nbsp; </P>
<P><STRONG>File permissions</STRONG></P>
<P>In some cases a program might change file permissions or creates a new file/folder within the profile but incorrect permissions.&nbsp; This may leave the profile load/unload process unable to copy it or delete it. To resolve the issue you have to take ownership first before you can delete the file or folder. UPHClean takes care of those situations.</P>
<P><BR><STRONG>Real world problems</STRONG></P>
<P>Here are actual scenarios that UPHClean v2.0 resolves:</P>
<UL>
<LI>VMware hgfs.dat <BR>VMware creates the hgfs.dat file in profile folder for the first user that logs in and keeps it open. When using roaming profiles you get a problem with that. (read VMware <A href="http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1317" target=_blank mce_href="http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1317">FAQ1317</A> for a solution)</LI>
<LI>SUN Java (JRE)<BR>In some cases SUN Java creates a folder called hsperfdata&lt;username&gt; with file permissions only set to the user and can not be removed by the system without taking ownership. SUN say’s this is by design (bug id <A href="http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=5042659" target=_blank mce_href="http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=5042659">5042659</A>)
<LI>Microsoft Internet explorer cookies and favorites<BR>Favorites and cookie files sometimes excide more than 255 chars and can only be deleted through the command line
<LI>Also suspects for open file handles causing sharing violation <BR>SAP SapGui (SapWorkDir), Imprivata SSO, Indexing Software, Virus scanner etc.</LI></UL>
<P>It will be supported on Windows 2000 (all versions), Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008.&nbsp; It will be available for 32 bit and 64 bit platforms.&nbsp; There are&nbsp;beta bit available for 32 and 64 bit platforms for all Windows 2000, Windows XP, and Windows Server 2003.</P><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=2940736&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxWindows Vista, Windows Server 2008 and UPHCleanhttp://blogs.technet.com/b/uphclean/archive/2008/02/28/windows-vista-windows-server-2008-and-uphclean.aspx2008-02-28T20:32:00Z2008-02-28T20:32:00Z<P>UPHClean&nbsp;fails to install on Windows Vista and Windows Server 2008.&nbsp; This happens because the User Profile service included with those operating system includes the functionality of UPHClean v1.6 built in.&nbsp; There is no point in having UPHClean perform its monitoring work when the profile service does all necessary work to prevent user hive fails from occuring.</P>
<P>Whereas UPHClean logs event 1401 to indicate that it took action to resolve a problem that would have prevent a user profile hive from unloading, the User Profile service logs event 1530.&nbsp; It looks like this:</P>
<P>Log Name: Application<BR>Source: Microsoft-Windows-User Profiles Service<BR>Date: 2/28/2008 2:56:52 PM<BR>Event ID: 1530<BR>Task Category: None<BR>Level: Warning<BR>Keywords: Classic<BR>User: SYSTEM<BR>Computer: RCARON-PC<BR>Description:<BR>Windows detected your registry file is still in use by other applications or<BR>services. The file will be unloaded now. The applications or services that<BR>hold your registry file may not function properly afterwards.<BR><BR>DETAIL -<BR>1 user registry handles leaked from<BR>\Registry\User\S-1-5-21-2641105361-2081720548-7543625-1000:<BR>Process 896 (\Device\HarddiskVolume1\Windows\System32\svchost. exe) has<BR>opened key \REGISTRY\USER\S-1-5-21-2641105361-2081720548-7543625-1000</P>
<P>This event is letting you know that when the profile was being unloaded svchost.exe with process id (PID) 896 had a registry key handle to the profile hive for the user with SID S-1-5-21-2641105361-2081720548-7543625-1000.</P>
<P>The event is there so you know that the system took action.&nbsp; That way you could know that if the application fails in some way you can investigate whether this action might be involved in the failure.&nbsp; Generally my advice for this (as for UPHClean event 1401) is to ignore it.</P>
<P>I am working on&nbsp;UPHClean v2.0.&nbsp; This version will address many more user profile problem scenarios.&nbsp; This version will likely install on Windows Vista and Windows Server 2008.&nbsp; It is in beta but currently the beta bits do not yet install on those operating systems.</P>
<P>Robin.</P><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=2940670&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashxHihttp://blogs.technet.com/b/uphclean/archive/2008/02/28/hi.aspx2008-02-28T18:27:00Z2008-02-28T18:27:00Z<P>I am Robin Caron.&nbsp; I have worked for 8 years as an escalation engineer for Microsoft supporting directory services technologies for the Windows platform.</P>
<P>I am starting this blog as a way to distribute information about UPHClean and to&nbsp;offer some ramblings&nbsp;about Windows user profiles.&nbsp; </P>
<P>UPHClean is a tool that I wrote about 5 years ago to help resolve the problem of user profile hive not unloading.&nbsp; When user profile hives do not unload you get a variety of problems including slow logoff (on Windows 2000), no reconciliation of roaming profiles, possible kernel memory exhaustion and a variety of error events logged in the application log.&nbsp; UPHClean helps this scenario.&nbsp; You can get UPHClean from <A class="" title=here href="http://www.microsoft.com/downloads/details.aspx?FamilyId=1B286E6D-8912-4E18-B570-42470E2F3582" mce_href="http://www.microsoft.com/downloads/details.aspx?FamilyId=1B286E6D-8912-4E18-B570-42470E2F3582">here</A>.</P>
<P>UPHClean was successful beyond my wildest dream (over 3 million downloads in less than 3 years).&nbsp; I worked with the profile team to get its functionality integrated into the operating system.&nbsp; This is now available in Windows Vista and Windows Server 2008 in the User Profile service.</P>
<P>I plan on telling you more about how profiles work and how UPHClean attempts to help with problems that occur with them.&nbsp;I'll also discuss problem scenarios future versions of UPHClean will attempt to help with.</P>
<P>Do not hesitate to give your feedback about what types of information about profiles/UPHClean you would like to see.&nbsp; You can either leave a comment here or send email to <A href="mailto:uphclean@microsoft.com" mce_href="mailto:uphclean@microsoft.com">uphclean@microsoft.com</A>.</P>
<P>Robin.</P><div style="clear:both;"></div><img src="http://blogs.technet.com/aggbug.aspx?PostID=2940493&AppID=6284&AppType=Weblog&ContentType=0" width="1" height="1">Robin Caronhttp://blogs.technet.com/rcaron/ProfileUrlRedirect.ashx